Short pages
Showing below up to 500 results in range #1 to #500.
View (previous 500 | next 500) (20 | 50 | 100 | 250 | 500)
- (hist) Work Specialization [653 bytes]
- (hist) Decentralization [666 bytes]
- (hist) Earned Schedule (ES) [668 bytes]
- (hist) Charismatic Leadership [673 bytes]
- (hist) Leadership Development Framework [673 bytes]
- (hist) Intrusion Detection Prevention (IDS) [679 bytes]
- (hist) Query [679 bytes]
- (hist) Cross-Cultural Leadership [684 bytes]
- (hist) Cost Allocation [687 bytes]
- (hist) Background Process [699 bytes]
- (hist) Data Storage [701 bytes]
- (hist) Competitive Pricing [703 bytes]
- (hist) Alternative Delivery Models [705 bytes]
- (hist) Theory of Inventive Problem Solving [705 bytes]
- (hist) Common Lisp Object System (CLOS) [707 bytes]
- (hist) Performance Goal [708 bytes]
- (hist) Two Factor Theory [709 bytes]
- (hist) Switch Framework [710 bytes]
- (hist) Incident [712 bytes]
- (hist) Organizational Health Index (OHI) [713 bytes]
- (hist) CIO Wiki:Privacy policy [715 bytes]
- (hist) Mass Customization [716 bytes]
- (hist) Electronic Data Processing (EDP) [716 bytes]
- (hist) Task Management [718 bytes]
- (hist) Attribution [719 bytes]
- (hist) Investment Management Lifecycle [720 bytes]
- (hist) Asymmetric Digital Subscriber Line (ADSL) [721 bytes]
- (hist) Advanced Manufacturing [722 bytes]
- (hist) Business Process Specification Schema (BPSS) [723 bytes]
- (hist) Software Architecture Analysis Method (SAAM) [724 bytes]
- (hist) Closed Source Software [728 bytes]
- (hist) Business Process Analytics [733 bytes]
- (hist) Run time (Program Lifecycle Phase) [733 bytes]
- (hist) Team Leadership [744 bytes]
- (hist) Vocabulary of Interlinked Datasets (VoID) [745 bytes]
- (hist) Intelligent Process Automation (IPA) [748 bytes]
- (hist) Brand Value [750 bytes]
- (hist) Component-Based Development (CBD) [754 bytes]
- (hist) Shareholder Theory [754 bytes]
- (hist) Delphi Method [755 bytes]
- (hist) Feedforward Neural Network [755 bytes]
- (hist) Behavioral Pattern [757 bytes]
- (hist) Cost Justification [760 bytes]
- (hist) Vital Business Function (VBF) [767 bytes]
- (hist) Consumer Confidence [770 bytes]
- (hist) Object Oriented Modeling (OOM) [774 bytes]
- (hist) Control Activities [779 bytes]
- (hist) Facilitative Leadership [785 bytes]
- (hist) Economic Capital (ECAP) [792 bytes]
- (hist) Stewardship Theory [796 bytes]
- (hist) Business Process Query Language (BPQL) [799 bytes]
- (hist) Democratic Leadership [802 bytes]
- (hist) Business Process Analysis [802 bytes]
- (hist) Operational Analytics [804 bytes]
- (hist) Value Risk Matrix (VRM) [813 bytes]
- (hist) Innovation Economics [814 bytes]
- (hist) Application Infrastructure Suite (AIS) [815 bytes]
- (hist) General Systems Theory (GST) [816 bytes]
- (hist) Analytic Hierarchy Process Framework (AHP) [832 bytes]
- (hist) Managed Service Provider (MSP) [832 bytes]
- (hist) The N7 and 7MP Tools [836 bytes]
- (hist) RCSA (Risk Control Self Assessment) [838 bytes]
- (hist) Service Request [840 bytes]
- (hist) Transactional Leadership [850 bytes]
- (hist) Universal Strategy Formulation Model (USFM) [854 bytes]
- (hist) Workflow [869 bytes]
- (hist) Empirical Method [870 bytes]
- (hist) Authentication [871 bytes]
- (hist) ITIL Service Value Chain (SVC) [871 bytes]
- (hist) Commercial off-the-shelf (COTS) [874 bytes]
- (hist) Lewin/Schein's Change Theory [874 bytes]
- (hist) Attribution Theory [879 bytes]
- (hist) Computer Architecture [879 bytes]
- (hist) Quality Management Maturity Grid (QMMG) [879 bytes]
- (hist) Object Modeling Technique (OMT) [880 bytes]
- (hist) Top-Level Domain (TLD) [885 bytes]
- (hist) Applied Analytics [886 bytes]
- (hist) Procedure Manual [889 bytes]
- (hist) DIKW Pyramid [890 bytes]
- (hist) Wi-Fi Network [891 bytes]
- (hist) Compensation [893 bytes]
- (hist) Enterprise Release Management (ERM) [893 bytes]
- (hist) Causal Ambiguity [895 bytes]
- (hist) Commodity Computing [898 bytes]
- (hist) Variable Costs [899 bytes]
- (hist) Application Lifecycle Framework [900 bytes]
- (hist) Kano Model [902 bytes]
- (hist) Flexible Organization [903 bytes]
- (hist) Procedure [905 bytes]
- (hist) ArchiMate [912 bytes]
- (hist) Art of War [915 bytes]
- (hist) Rapid Economic Justification (REJ™) [915 bytes]
- (hist) .MDB File Format [916 bytes]
- (hist) Standard Cost Pricing [916 bytes]
- (hist) Plesiochronous Digital Hierarchy (PDH) [916 bytes]
- (hist) Simple Network Management Protocol (SNMP) [918 bytes]
- (hist) Operational Support Services (OSS) [918 bytes]
- (hist) .NET Enterprise Server [919 bytes]
- (hist) Autocratic Leadership [923 bytes]
- (hist) Website Wireframe [932 bytes]
- (hist) Service-Based Costing [933 bytes]
- (hist) Tangible Book Value [937 bytes]
- (hist) Requirement [938 bytes]
- (hist) Cascading Style Sheet (CSS) [945 bytes]
- (hist) Reservoir Approach [945 bytes]
- (hist) 3D Modeling [946 bytes]
- (hist) Boil the Ocean [949 bytes]
- (hist) SCOR (Supply Chain Operations Reference Model) [954 bytes]
- (hist) IP Network [955 bytes]
- (hist) Yottabyte [956 bytes]
- (hist) Usability [961 bytes]
- (hist) Audio Messaging Interchange Specification (AMIS) [962 bytes]
- (hist) Intrusion Prevention System (IPS) [963 bytes]
- (hist) Asset Liability Management (ALM) [964 bytes]
- (hist) Blind Spot Analysis [966 bytes]
- (hist) Strategic Priorities [966 bytes]
- (hist) Organogram [967 bytes]
- (hist) Zeta Architecture [970 bytes]
- (hist) Barriers to Entry [971 bytes]
- (hist) Adaptive Control [974 bytes]
- (hist) Business Process Discovery [975 bytes]
- (hist) Five Whys [986 bytes]
- (hist) Product Personalization [990 bytes]
- (hist) Minimum Viable Product (MVP) [995 bytes]
- (hist) Workflow Reference Model [1,000 bytes]
- (hist) People, Process, Technology Framework [1,002 bytes]
- (hist) Internal Systems [1,002 bytes]
- (hist) Audit Trail [1,005 bytes]
- (hist) Financial Services Function Model (FSFM) [1,008 bytes]
- (hist) Bottom of the Pyramid (BOP) [1,009 bytes]
- (hist) Deliverable [1,009 bytes]
- (hist) Baseline [1,010 bytes]
- (hist) Binary Code [1,017 bytes]
- (hist) Application Service Provider (ASP) [1,019 bytes]
- (hist) Transition Methodology [1,019 bytes]
- (hist) Binary Digit (Bit) [1,021 bytes]
- (hist) Single Customer View [1,026 bytes]
- (hist) Box-Jenkins Method [1,027 bytes]
- (hist) Solutions Provider [1,027 bytes]
- (hist) Gartner Score [1,029 bytes]
- (hist) Yield to Maturity [1,030 bytes]
- (hist) Working Capital [1,034 bytes]
- (hist) Bitcoin [1,041 bytes]
- (hist) Guard Dog Theory [1,041 bytes]
- (hist) Web Development [1,042 bytes]
- (hist) Backbone [1,043 bytes]
- (hist) Nanotechnology [1,043 bytes]
- (hist) Application Sharing [1,049 bytes]
- (hist) ICT4D (Information and Communication Technologies for Development) [1,049 bytes]
- (hist) Unique Selling Proposition [1,051 bytes]
- (hist) Pricing [1,052 bytes]
- (hist) Restructuring [1,054 bytes]
- (hist) Business Process Maturity Model (BPMM) [1,054 bytes]
- (hist) Cyber Attack [1,056 bytes]
- (hist) Dashboard [1,057 bytes]
- (hist) Level 5 Leadership [1,059 bytes]
- (hist) Context of Use (CoU) Analysis [1,061 bytes]
- (hist) Average Rate of Return [1,065 bytes]
- (hist) White Knight [1,065 bytes]
- (hist) Basel Committee on Banking Supervision [1,066 bytes]
- (hist) Consulting Services [1,066 bytes]
- (hist) Guideline [1,067 bytes]
- (hist) Available to Promise (ATP) [1,068 bytes]
- (hist) Project [1,068 bytes]
- (hist) Heart Framework [1,069 bytes]
- (hist) Mergers and Acquisitions (M&A) [1,071 bytes]
- (hist) Organizational Flexibility [1,073 bytes]
- (hist) The Open Information Systems Management Maturity Model (O-ISM3) [1,075 bytes]
- (hist) SHARP (Structured, Holistic Approach for a Research Proposal) [1,077 bytes]
- (hist) Broad Network Access [1,079 bytes]
- (hist) Information Governance Reference Model (IGRM) [1,080 bytes]
- (hist) Perceived Value Pricing [1,080 bytes]
- (hist) Attrition [1,081 bytes]
- (hist) Smart Information Systems (SIS) [1,081 bytes]
- (hist) Book Value [1,085 bytes]
- (hist) Data Enrichment [1,088 bytes]
- (hist) Supplier Value [1,088 bytes]
- (hist) Design of Experiments [1,090 bytes]
- (hist) Interaction Technique [1,095 bytes]
- (hist) Financial Services Workflow Model (FSWM) [1,095 bytes]
- (hist) Asset Liability Modeling [1,098 bytes]
- (hist) Assets Held For Sale [1,100 bytes]
- (hist) Globalization Management System (GMS) [1,101 bytes]
- (hist) Preferred Stock [1,102 bytes]
- (hist) Background Intelligent Transfer Service (BITS) [1,104 bytes]
- (hist) Standard Generalized Markup Language (SGML) [1,104 bytes]
- (hist) Mobile Network [1,104 bytes]
- (hist) Semantic Data Modeling [1,106 bytes]
- (hist) Porter's 3 Generic Strategies [1,107 bytes]
- (hist) Service Integration and Management (SIAM) [1,108 bytes]
- (hist) Year 2000 (Y2K) [1,109 bytes]
- (hist) Design Tool [1,110 bytes]
- (hist) Cloud Manufacturing [1,113 bytes]
- (hist) Shareholder [1,113 bytes]
- (hist) Fiber to the Home (FTTH) [1,114 bytes]
- (hist) Viable System Model (VSM) [1,115 bytes]
- (hist) Backward Integration [1,116 bytes]
- (hist) Wireless LAN [1,116 bytes]
- (hist) Branded Content Management [1,117 bytes]
- (hist) Z-Score [1,121 bytes]
- (hist) Programmable Logic Controller (PLC) [1,122 bytes]
- (hist) SOA Governance [1,123 bytes]
- (hist) Current Good Manufacturing Practice (cGMP) [1,124 bytes]
- (hist) Security Policy [1,125 bytes]
- (hist) Autoregressive Integrated Moving Average (ARIMA) Model [1,128 bytes]
- (hist) Financing [1,131 bytes]
- (hist) Browser Hijacking [1,132 bytes]
- (hist) Target Market [1,132 bytes]
- (hist) Average Cost Pricing [1,134 bytes]
- (hist) Back-End Plan [1,137 bytes]
- (hist) Performance Metrics [1,137 bytes]
- (hist) Swim Lane Diagram [1,140 bytes]
- (hist) IP Address [1,142 bytes]
- (hist) Backup Server [1,144 bytes]
- (hist) Microblogging [1,144 bytes]
- (hist) Network News Transfer Protocol (NNTP) [1,145 bytes]
- (hist) Internet Privacy [1,146 bytes]
- (hist) Mobile Platform as a Service (mPaaS) [1,147 bytes]
- (hist) Crown Jewel Defense [1,149 bytes]
- (hist) Swivel Chair Interface [1,150 bytes]
- (hist) Relational Capital [1,151 bytes]
- (hist) Virtual Machine Manager (VMM) [1,153 bytes]
- (hist) Smart Device [1,153 bytes]
- (hist) Shared Services [1,153 bytes]
- (hist) Identity Theft [1,156 bytes]
- (hist) Binomial Option Pricing Model [1,157 bytes]
- (hist) Bait and Switch [1,159 bytes]
- (hist) Hadoop [1,159 bytes]
- (hist) Data Integrity [1,160 bytes]
- (hist) Template [1,162 bytes]
- (hist) Back-End [1,165 bytes]
- (hist) Extended Enterprise [1,166 bytes]
- (hist) Hypertext Transfer Protocol (HTTP) [1,167 bytes]
- (hist) Web Portal [1,167 bytes]
- (hist) Graduated Security [1,167 bytes]
- (hist) Hiring [1,167 bytes]
- (hist) Industry Models [1,167 bytes]
- (hist) Business Objects [1,172 bytes]
- (hist) Balanced Technology Extended (BTX) [1,173 bytes]
- (hist) Knowledge Base [1,173 bytes]
- (hist) Critical Success Factor (CSF) [1,174 bytes]
- (hist) Boundary Value Analysis [1,177 bytes]
- (hist) Business Process as a Service (BPaaS) [1,177 bytes]
- (hist) Cost Analysis [1,178 bytes]
- (hist) CXML (Commerce eXtensible Markup Language) [1,179 bytes]
- (hist) Synchromarketing [1,179 bytes]
- (hist) Diminishing Marginal Utility [1,180 bytes]
- (hist) Synchronous Digital Hierarchy (SDH) [1,182 bytes]
- (hist) Value Methodology [1,183 bytes]
- (hist) Exit Strategy [1,185 bytes]
- (hist) Sub Contractor [1,186 bytes]
- (hist) Human Development Theory [1,187 bytes]
- (hist) Quality Function Deployment (QFD) [1,187 bytes]
- (hist) Attribute-Driven Design Method [1,189 bytes]
- (hist) Zero-sum Game [1,189 bytes]
- (hist) Organizational Alignment [1,191 bytes]
- (hist) Committee of Sponsoring Organizations of the Treadway Commission (COSO) [1,192 bytes]
- (hist) Retention Ratio [1,193 bytes]
- (hist) Operational Capability [1,193 bytes]
- (hist) Building Management Systems (BMS) [1,194 bytes]
- (hist) Better Business Case (BBC) [1,195 bytes]
- (hist) Digital Asset Management (DAM) [1,195 bytes]
- (hist) Collaborative Content Management [1,195 bytes]
- (hist) Use Case [1,195 bytes]
- (hist) Business Continuity Management (BCM) [1,199 bytes]
- (hist) Big Data Maturity Model (BDMM) [1,200 bytes]
- (hist) Portability [1,201 bytes]
- (hist) Multi Channel Marketing [1,201 bytes]
- (hist) Strategic Human Resource Management (SHRM) [1,201 bytes]
- (hist) Enterprise Model [1,203 bytes]
- (hist) Application Service Management (ASM) [1,204 bytes]
- (hist) Terms of Service [1,205 bytes]
- (hist) Feng's Classification [1,205 bytes]
- (hist) Infrastructure Outsourcing [1,205 bytes]
- (hist) Pareto Principle [1,206 bytes]
- (hist) Visual Analytics [1,209 bytes]
- (hist) Click-Through Rate (CTR) [1,211 bytes]
- (hist) Plug-in [1,213 bytes]
- (hist) Semantic Web [1,213 bytes]
- (hist) Availability Plan [1,215 bytes]
- (hist) Business Process Change Cycle [1,217 bytes]
- (hist) Schedule Performance Index (SPI) [1,217 bytes]
- (hist) User Interface Design (UI) [1,218 bytes]
- (hist) Subliminal Advertizing [1,221 bytes]
- (hist) Dark Web [1,221 bytes]
- (hist) Market Share [1,225 bytes]
- (hist) Reliability Block Diagram (RBD) [1,226 bytes]
- (hist) Fourier Analysis [1,230 bytes]
- (hist) Unstructured Information Management Architecture (UIMA) [1,231 bytes]
- (hist) Bandwagon Effect [1,232 bytes]
- (hist) Dynamic HTML [1,232 bytes]
- (hist) Weighted Micro Function Points (WMFP) [1,233 bytes]
- (hist) Systemic Risk [1,233 bytes]
- (hist) Atomization [1,235 bytes]
- (hist) Privacy Policy [1,235 bytes]
- (hist) Network Motif [1,237 bytes]
- (hist) Dunning-Kruger Effect [1,237 bytes]
- (hist) Compatible Time Sharing System (CTSS) [1,238 bytes]
- (hist) Binary File [1,243 bytes]
- (hist) Information Asymmetry [1,243 bytes]
- (hist) Deliberate Strategy [1,244 bytes]
- (hist) System of Record (SOR) [1,246 bytes]
- (hist) Value Proposition [1,247 bytes]
- (hist) Direct Marketing [1,249 bytes]
- (hist) Gartner's Market Share Analysis [1,249 bytes]
- (hist) Behavior Learning Engine (BLE) [1,251 bytes]
- (hist) Ring Fencing [1,252 bytes]
- (hist) Management Information System (MIS) [1,255 bytes]
- (hist) Scientific Management Theory [1,258 bytes]
- (hist) On-Demand Software [1,262 bytes]
- (hist) Supplier Relationship Management [1,262 bytes]
- (hist) Abilene Paradox [1,263 bytes]
- (hist) Economic Value [1,263 bytes]
- (hist) Straw Man Concept [1,263 bytes]
- (hist) Platform as a Service (PaaS) [1,265 bytes]
- (hist) Quality Management [1,265 bytes]
- (hist) Market Driven Organization [1,265 bytes]
- (hist) Binary Large Object (BLOB) [1,269 bytes]
- (hist) Workers Compensation Insurance [1,269 bytes]
- (hist) Value Based Management [1,270 bytes]
- (hist) Talent Management [1,270 bytes]
- (hist) Transactional Content Management (TCM) [1,270 bytes]
- (hist) Substitution Effect [1,271 bytes]
- (hist) Web Services Flow Language (WSFL) [1,272 bytes]
- (hist) Shareholders' Equity [1,273 bytes]
- (hist) Trusted Computer System Evaluation Criteria (TCSEC) [1,274 bytes]
- (hist) C-Suite [1,274 bytes]
- (hist) Concentrated Marketing [1,275 bytes]
- (hist) Large-Scale Integration (LSI) [1,275 bytes]
- (hist) Asynchronous JavaScript and XML (AJAX) [1,276 bytes]
- (hist) Forced Compliance [1,278 bytes]
- (hist) Actual Cost (AC) [1,278 bytes]
- (hist) Object Oriented Approach [1,279 bytes]
- (hist) Componentization [1,281 bytes]
- (hist) Strategic Change Momentum [1,282 bytes]
- (hist) Software Development Effort Estimation [1,284 bytes]
- (hist) Social Intelligence [1,285 bytes]
- (hist) Bankmail Engagement [1,286 bytes]
- (hist) User Interface [1,287 bytes]
- (hist) Supervisory Control and Data Acquisition (SCADA) [1,288 bytes]
- (hist) Internet Protocol (IP) [1,288 bytes]
- (hist) Organic Growth [1,289 bytes]
- (hist) Code of Ethics [1,291 bytes]
- (hist) Behavior Driven Development (BDD) [1,292 bytes]
- (hist) World Class Manufacturing [1,294 bytes]
- (hist) Strategic Initiatives [1,294 bytes]
- (hist) Structure Chart [1,294 bytes]
- (hist) Office of Strategy Management [1,297 bytes]
- (hist) Synectics [1,297 bytes]
- (hist) Application Life Cycle Management Platform as a Service (ALM PaaS) [1,298 bytes]
- (hist) Value at Risk [1,299 bytes]
- (hist) Cannibalization [1,301 bytes]
- (hist) Strategic Architecture [1,301 bytes]
- (hist) CMN-GOMS [1,301 bytes]
- (hist) Business Rule [1,301 bytes]
- (hist) Outcome [1,304 bytes]
- (hist) Employee Turnover [1,305 bytes]
- (hist) Balance Theory [1,307 bytes]
- (hist) Bond Insurance [1,307 bytes]
- (hist) Bottom-up Approach [1,307 bytes]
- (hist) Pareto Chart [1,307 bytes]
- (hist) Reference Semantic Model (RSM) [1,307 bytes]
- (hist) Fault Tree Analysis (FTA) [1,308 bytes]
- (hist) Probability Theory [1,309 bytes]
- (hist) Straight Through Processing (STP) [1,310 bytes]
- (hist) Preboot Execution Environment (PXE) [1,311 bytes]
- (hist) Distributor [1,314 bytes]
- (hist) Social Multi Criteria Analysis (SMCA) [1,314 bytes]
- (hist) Structured Data Analysis [1,315 bytes]
- (hist) IT Productivity Paradox [1,316 bytes]
- (hist) Information Quality Management (IQM) [1,317 bytes]
- (hist) Viability Study [1,319 bytes]
- (hist) Internet Service Provider (ISP) [1,319 bytes]
- (hist) Budgeted Cost of Work Scheduled (BCWS) [1,319 bytes]
- (hist) Data Dictionary [1,320 bytes]
- (hist) Coaching [1,321 bytes]
- (hist) Direct Mail [1,321 bytes]
- (hist) Retired Services [1,323 bytes]
- (hist) Telemarketing [1,325 bytes]
- (hist) Management Buy-Out [1,326 bytes]
- (hist) Industry Life Cycle [1,327 bytes]
- (hist) Collective Intelligence [1,328 bytes]
- (hist) Channel Management [1,330 bytes]
- (hist) Service Mark [1,330 bytes]
- (hist) Break-even Point [1,331 bytes]
- (hist) Profit Motive [1,331 bytes]
- (hist) Information Mapping [1,333 bytes]
- (hist) Software Visualization [1,333 bytes]
- (hist) Design Principles [1,335 bytes]
- (hist) Risk Maturity [1,337 bytes]
- (hist) Quantitative Investment Analysis [1,337 bytes]
- (hist) Strategic Infliction Point [1,337 bytes]
- (hist) Security Management [1,337 bytes]
- (hist) Cost of Equity [1,338 bytes]
- (hist) Financial Services Data Model (FSDM) [1,338 bytes]
- (hist) Desktop Operating System [1,339 bytes]
- (hist) Executive Information System (EIS) [1,340 bytes]
- (hist) Probability Distribution [1,343 bytes]
- (hist) Systems Architecture [1,343 bytes]
- (hist) Bayes' Theorem [1,344 bytes]
- (hist) Software Sizing [1,345 bytes]
- (hist) Recurrent Neural Network (RNN) [1,346 bytes]
- (hist) Underpinning Contract (UC) [1,347 bytes]
- (hist) Simulation Modeling [1,348 bytes]
- (hist) Computerized Maintenance Management System (CMMS) [1,349 bytes]
- (hist) Enterprise Architecture Life Cycle (EALC) [1,349 bytes]
- (hist) Asset Performance Management (APM) [1,350 bytes]
- (hist) Health Insurance Portability and Accountability Act (HIPAA) [1,351 bytes]
- (hist) Project Dependencies [1,352 bytes]
- (hist) Capitalism [1,353 bytes]
- (hist) Purchase Order [1,353 bytes]
- (hist) Resource Description Framework (RDF) [1,354 bytes]
- (hist) Blake and Mouton's Managerial Grid [1,354 bytes]
- (hist) Integrative Thinking [1,359 bytes]
- (hist) Software Archeology [1,359 bytes]
- (hist) Value Creation Index [1,361 bytes]
- (hist) Cyberspace [1,361 bytes]
- (hist) Strategic Themes [1,362 bytes]
- (hist) Data Asset Framework (DAF) [1,363 bytes]
- (hist) Brand Line [1,363 bytes]
- (hist) Browser Isolation [1,370 bytes]
- (hist) Workplace Safety [1,370 bytes]
- (hist) Information as a Service (IaaS) [1,371 bytes]
- (hist) Stakeholder Engagement [1,371 bytes]
- (hist) Operating Expenses [1,373 bytes]
- (hist) Brand Reputation [1,373 bytes]
- (hist) Cost to Serve (CTS) [1,378 bytes]
- (hist) Extensible Authentication Protocol (EAP) [1,379 bytes]
- (hist) Formal Organization [1,379 bytes]
- (hist) Phishing [1,380 bytes]
- (hist) Productive Efficiency [1,381 bytes]
- (hist) Marketing Metrics [1,382 bytes]
- (hist) Subscription Right [1,382 bytes]
- (hist) Payback Period [1,383 bytes]
- (hist) CAN-SPAM Act of 2003 [1,384 bytes]
- (hist) Dependency Network [1,385 bytes]
- (hist) Health Level 7 (HL7) [1,385 bytes]
- (hist) Rätselvermehrung [1,385 bytes]
- (hist) Organizational Behavior [1,385 bytes]
- (hist) Value for Money Audit [1,386 bytes]
- (hist) Advanced Distribution Protection and Restoration Devices [1,388 bytes]
- (hist) Markup Language [1,388 bytes]
- (hist) Autonomous System Number (ASN) [1,391 bytes]
- (hist) Value-Based Business-IT Alignment (VITAL) Project [1,394 bytes]
- (hist) Strike Price [1,394 bytes]
- (hist) Total Shareholder Return (TSR) [1,395 bytes]
- (hist) Dempster Shafer (D-S) Theory [1,396 bytes]
- (hist) Investor Sentiment [1,397 bytes]
- (hist) Crescendo Model of Rejuvenation [1,397 bytes]
- (hist) Diminishing Returns (DR) [1,398 bytes]
- (hist) SMS Marketing [1,400 bytes]
- (hist) Strategic Imperatives [1,401 bytes]
- (hist) Support Activities [1,401 bytes]
- (hist) Commercial Property Insurance [1,403 bytes]
- (hist) Pricing Model [1,404 bytes]
- (hist) Infrastructure as a Service (IaaS) [1,405 bytes]
- (hist) Social Cost Benefit Analysis (SCBA) [1,405 bytes]
- (hist) Cross Training (Business) [1,407 bytes]
- (hist) Sunk Cost [1,407 bytes]
- (hist) Supply Chain Design [1,407 bytes]
- (hist) Information Privacy [1,409 bytes]
- (hist) Supply Chain Visibility (SCV) [1,409 bytes]
- (hist) Virtual Customer Premises Equipment (vCPE) [1,410 bytes]
- (hist) Request for Proposal (RFP) [1,411 bytes]
- (hist) Blogging Platform [1,412 bytes]
- (hist) Information Flow [1,412 bytes]
- (hist) Network Monitoring [1,413 bytes]
- (hist) Supplier Evaluation [1,413 bytes]
- (hist) National Change of Address (NCOA) [1,415 bytes]
- (hist) Business Transaction Protocol (BTP) [1,417 bytes]
- (hist) Hedging [1,418 bytes]
- (hist) Inventory Shrinkage [1,418 bytes]
- (hist) Business Process Simulation [1,420 bytes]
- (hist) Open Security Architecture (OSA) Framework [1,420 bytes]
- (hist) Document Modeling [1,421 bytes]
- (hist) Gantt Chart [1,421 bytes]
- (hist) Penetration Pricing [1,421 bytes]
- (hist) Cause and Effect Diagram [1,422 bytes]
- (hist) Common Alerting Protocol (CAP) [1,422 bytes]
- (hist) The Abridged Big Five-Dimensional Circumplex (AB5C) [1,425 bytes]
- (hist) Application Control [1,427 bytes]
- (hist) Bridging Epistemologies [1,429 bytes]
- (hist) Strategic Grid for IT [1,431 bytes]
- (hist) Document Object Model (DOM) [1,431 bytes]
- (hist) Information Governance Professional (IGP) Certification [1,432 bytes]
- (hist) Professional Liability Insurance [1,432 bytes]
- (hist) Strategic Synergy [1,432 bytes]
- (hist) Intrinsic Stakeholder Commitment [1,434 bytes]
- (hist) Six Webs Framework [1,434 bytes]
- (hist) Supplier Scorecard [1,435 bytes]
- (hist) Crypto Currency [1,436 bytes]
- (hist) Play Theory of Mass Communication [1,437 bytes]
- (hist) Storage Device [1,438 bytes]
- (hist) Primary Customer [1,439 bytes]
- (hist) Web Content Management [1,440 bytes]
- (hist) Information Model [1,441 bytes]
- (hist) Structured Analysis and Design Technique (SADT) [1,442 bytes]
- (hist) POSDCORB [1,443 bytes]
- (hist) Reverse Logistics [1,444 bytes]
- (hist) MoSCoW Method [1,444 bytes]